Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
We report on a case study in which the model checker Uppaal is used to formally model parts of Zeroconf, a protocol for dynamic configuration of IPv4 link-local addresses that has...
Biniam Gebremichael, Frits W. Vaandrager, Miaomiao...
Background: The ESTree database (db) is a collection of Prunus persica and Prunus dulcis EST sequences that in its current version encompasses 75,404 sequences from 3 almond and 1...
Barbara Lazzari, Andrea Caprera, Alberto Vecchiett...